我困惑于此。 我有Exchange Server 2003仍在使用中。 我创build了一个有效的LetsEncrypt SSL证书,并成功地将pfx导入了默认SMTP虚拟服务器属性“访问”选项卡。 现在,发送EHLO的客户被告知STARTTLS可用。 但是,我的几个电子邮件客户端(必须设置为使用STARTTLS,如果可用)停止发送邮件。 我已经使用Wireshark观察成功的电子邮件在添加证书(执行身份validation之前)以及在添加证书之后再次出去。 在添加证书之后,EHLO指示STARTTLS可用。 客户端发送STARTLS。 服务器响应“2.0.0 SMTP服务器就绪”。 客户端发送SSL客户端Hello,10ms后,SMTP服务器closures连接(FIN,ACK数据包发送回客户端)。 这是结束。
不知道如何诊断这一点。 事件日志中没有任何内容。 我有一个login窗口LogFIles SMTPSvc1文件夹。 以下是在指定STARTTLS并且服务器挂起时显示的内容:
2017-10-28 14:20:01 192.168.5.80 localhost 250 0 110 2017-10-28 14:20:01 192.168.5.80 localhost 220 0 0 2017-10-28 14:20:01 192.168.5.80 localhost 220 0 0 2017-10-28 14:20:01 192.168.5.80 localhost 503 2148074248 31 2017-10-28 14:20:01 192.168.5.80 localhost 240 203 31
作为参考,当我删除证书,所以没有发送STARTTLS,客户端authentication,然后成功发送,这里是日志条目:
2017-10-28 13:43:26 192.168.5.80 localhost 250 0 0 2017-10-28 13:43:26 192.168.5.80 localhost 250 0 0 2017-10-28 13:43:26 192.168.5.80 localhost 250 0 0 2017-10-28 13:43:26 192.168.5.80 localhost 250 0 281 2017-10-28 13:43:26 192.168.5.80 localhost 240 703 0
如果有人知道这里有什么,这可能是有帮助的,这里是最后两个数据包追踪 – 客户端你好和RST挂断…
No. Time Source Destination Protocol Length Info 17 2017-10-28 09:41:05.669172000 192.168.5.80 192.168.1.11 SSL 583 Client Hello Frame 17: 583 bytes on wire (4664 bits), 583 bytes captured (4664 bits) on interface 0 Internet Protocol Version 4, Src: 192.168.5.80 (192.168.5.80), Dst: 192.168.1.11 (192.168.1.11) Transmission Control Protocol, Src Port: 48022 (48022), Dst Port: 25 (25), Seq: 27, Ack: 485, Len: 517 Source Port: 48022 (48022) Destination Port: 25 (25) [Stream index: 1] [TCP Segment Len: 517] Sequence number: 27 (relative sequence number) [Next sequence number: 544 (relative sequence number)] Acknowledgment number: 485 (relative ack number) Header Length: 32 bytes .... 0000 0001 1000 = Flags: 0x018 (PSH, ACK) Window size value: 237 [Calculated window size: 30336] [Window size scaling factor: 128] Checksum: 0x87d7 [validation disabled] Urgent pointer: 0 Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps [SEQ/ACK analysis] Secure Sockets Layer SSL Record Layer: Handshake Protocol: Client Hello Content Type: Handshake (22) Version: TLS 1.0 (0x0301) Length: 512 Handshake Protocol: Client Hello Handshake Type: Client Hello (1) Length: 508 Version: TLS 1.2 (0x0303) Random Session ID Length: 0 Cipher Suites Length: 124 Cipher Suites (62 suites) Compression Methods Length: 1 Compression Methods (1 method) Extensions Length: 343 Extension: server_name Type: server_name (0x0000) Length: 17 Server Name Indication extension Server Name list length: 15 Server Name Type: host_name (0) Server Name length: 12 Server Name: 192.168.1.11 Extension: ec_point_formats Type: ec_point_formats (0x000b) Length: 4 EC point formats Length: 3 Elliptic curves point formats (3) Extension: elliptic_curves Type: elliptic_curves (0x000a) Length: 10 Elliptic Curves Length: 8 Elliptic curves (4 curves) Extension: SessionTicket TLS Type: SessionTicket TLS (0x0023) Length: 0 Data (0 bytes) Extension: signature_algorithms Type: signature_algorithms (0x000d) Length: 32 Signature Hash Algorithms Length: 30 Signature Hash Algorithms (15 algorithms) Extension: Unknown 22 Type: Unknown (0x0016) Length: 0 Data (0 bytes) Extension: Unknown 23 Type: Unknown (0x0017) Length: 0 Data (0 bytes) Extension: Padding Type: Padding (0x0015) Length: 248 Padding Data: 000000000000000000000000000000000000000000000000... No. Time Source Destination Protocol Length Info 18 2017-10-28 09:41:05.675195000 192.168.1.11 192.168.5.80 TCP 66 25→48022 [FIN, ACK] Seq=485 Ack=544 Win=64992 Len=0 TSval=52648030 TSecr=1233339601 Frame 18: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface 0 Internet Protocol Version 4, Src: 192.168.1.11 (192.168.1.11), Dst: 192.168.5.80 (192.168.5.80) Transmission Control Protocol, Src Port: 25 (25), Dst Port: 48022 (48022), Seq: 485, Ack: 544, Len: 0 Source Port: 25 (25) Destination Port: 48022 (48022) [Stream index: 1] [TCP Segment Len: 0] Sequence number: 485 (relative sequence number) Acknowledgment number: 544 (relative ack number) Header Length: 32 bytes .... 0000 0001 0001 = Flags: 0x011 (FIN, ACK) Window size value: 64992 [Calculated window size: 64992] [Window size scaling factor: 1] Checksum: 0x9699 [validation disabled] Urgent pointer: 0 Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps [SEQ/ACK analysis]
我很确定问题是旧的Exchange Server 2003 SMTP服务器只支持TLS 1.0,这不再被认为是很安全的。 显然,它不会支持任何新的密码。 所以,再次没有证据,我敢肯定,另一端是挂起的,因为STARTTLS /客户端的Hello消息表明,服务器提供的协议和/或密码不存在重叠。 我已经通过在Exchange Server 2003和世界其他地方之间粘贴更新的SMTP服务器(来自hMailServer)解决了我的问题。 这已经解决了我的问题。 更好的长期方法是从环境中删除Exchange 2003 Server。